WannaCry is not the only dangerous threat

Now it is obvious that these attacks signaled another wave of the attack which was about to hit the UK and Ukraine. Today, June 27th, companies as well as public institutions reported having been attacked by the supposed new version of WannaCry.

British advertising agency WPP, the Chernobyl nuclear power plant, Russian oil producer Rosneft, Danish transportation company Maersk, Spanish companies, Mondelez and legal firm DLA Pipe, and many more reported that their computer systems had been affected by the crypto-malware.[1]

According to the screen capture, the ransomware imitates the ransom note employed by WannaCry though the experts have revealed that it is actually Petya, one of the older but, nonetheless, highly menacing threats. Though its activity fluctuates, it has been sold in the darknet as ransomware-as0-service (RaaS).[2] Its latest version, Petrwrap, has been spotted online this year as well.

Ukraine shares notorious popularity among hackers

Observing recent global cyber assaults, it is easy to notice that Ukraine has happened to be a more frequent target for cyber perpetrators. During WannaCry attack, it was one of the most affected countries.

However, it suffered another blow right after WannaCry termination. Xdata threat[3] wreaked significantly more damage than the former threat on a world scale.
The latter attack by Petya also inflicted great damage to this country – Chernobyl power plant was affected. Workers had to manage the radiation levels manually as the threat shut down Windows

OS based systems. These attacks might be more of political origin. On the other hand, different styles and types of assaults reveal that different perpetrators are behind the attacks even if they collaborate.

Any positive signs?

After the first wave of WannaCry attack had dashed away, cyber security forces were encouraging the virtual community to reconsider their security and update their operating systems.

Unfortunately, since many facilities such as airports, which operate on the basis of Windows OS, cannot be shut down temporarily, they fell for the hackers’ bait.

Petya[4] authors seem to have benefitted from previously leaked NSA hacking tools and WannaCry authors’ mistakes. Major corporations and companies must face this issue and update their systems even if it causes temporal inconvenience for their users as, otherwise, the ransomware threats will continue spreading terror in the virtual community.

Meet Linas Kiguolis, the founder and chief editor of TecoReviews. His interests in latest modern technologies, cyber security, social media led him to study Applied Computer Sciences and Business Informatics. Merging the acquired theoretical knowledge and his passion for IT gadgets shaped TecoReviews. As for the free time, Linas finds peace of mind in immersing himself in robotics and Capoeira sport.